IT

ITDLO6023: Digital Forensics Syllabus for IT 6th Sem 2018 Pattern Mumbai University (Department Level Optional Course-2)

Digital Forensics detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the MU official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For 6th Sem Scheme of Information Technology (IT), 2018 Pattern, do visit IT 6th Sem Scheme, 2018 Pattern. For the Department Level Optional Course-2 scheme of 6th Sem 2018 regulation, refer to IT 6th Sem Department Level Optional Course-2 Scheme 2018 Pattern. The detail syllabus for digital forensics is as follows.

Digital Forensics Syllabus for Information Technology TE 6th Sem 2018 Pattern Mumbai University

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

Student will able to:

  1. Define the concept of ethical hacking and its associated applications in Information Communication Technology (ICT) world.
  2. Underline the need of digital forensic and role of digital evidences .
  3. Explain the methodology of incident response and various security issues in ICT world, and identify digital forensic tools for data collection .
  4. Recognize the importance of digital forensic duplication and various tools for analysis to achieve adequate perspectives of digital forensic investigation in various applications /devices like Windows/Unix system.
  5. Apply the knowledge of IDS to secure network and performing router and network analysis
  6. List the method to generate legal evidence and supporting investigation reports and will also be able to use various digital forensic tools .

Prerequisites:

Cryptography and Security, Computer Networks

Module I

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module II

Introduction to Digital Forensics and Digital Evidences Digital Forensic ,Rules for Digital Forensic The Need for Digital Forensics, Types of Digital Forensics, Ethics in Digital Forensics, Digital Evidences : Types and characteristics and challenges for Evidence Handling 6 CO2

Module III

Computer Security Incident Response Methodology Introduction to Computer Security Incident Goals of Incident response, Incident Response Methodology, Formulating Response Strategy, IR Process – Initial Response, Investigation, Remediation, Tracking of Significant ,Investigative Information, Reporting Pre Incident Preparation, Incident Detection and Characterization. Live Data Collection : Live Data Collection on Microsoft Windows Systems: Live Data 11 CO3 Collection on Unix-Based Systems

Module IV

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module V

Network Forensics Technical Exploits and Password Cracking , Introduction to Intrusion Detection systems, Types of IDS Understanding Network intrusion and attacks , Analyzing Network Traffic, Collecting Network based evidence, Evidence Handling. Investigating Routers, Handling Router Table Manipulation Incidents, Using Routers as Response Tools 9 CO5

Module VI

Forensic Investigation Report :Goals of Report, Layout of an Report and Forensic Tools Investigative Report, Guidelines for Writing a Report, sample for writing a forensic report . Computer Forensic Tools : need and types of computer forensic tools, task performed by computer forensic tools . Study of open source Tools like SFIT, Autopsy etc. to acquire, search, analyze and store digital evidence 7 CO6

Text Books:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Clint P Garrison Digital Forensics for Network, Internet, and Cloud Computing A forensic evidence guide for moving targets and data , Syngress Publishing, Inc. 2010
  2. Bill Nelson,Amelia Phillips,Christopher Steuart, Guide to Computer Forensics and Investigations . Cengage Learning, 2014
  3. Debra Littlejohn Shinder Michael Cross Scene of the Cybercrime: Computer Forensics Handbook, 2nd Edition Syngress Publishing, Inc.2008.
  4. Marjie T. Britz, Computer Forensics and Cyber Crime, Pearson, Third Edition.

Assessment:

Internal Assessment for 20 marks: Consisting of Two Compulsory Class Tests Approximately 40% to 50% of syllabus content must be covered in First test and remaining 40% to 50% of syllabus contents must be covered in second test. End Semester Theory Examination: Some guidelines for setting the question papers are as:

  • Weightage of each module in end semester examination is expected to be/will be proportional to number of respective lecture hours mentioned in the syllabus.
  • Question paper will comprise of total six questions, each carrying 20 marks.
  • Q.1 will be compulsory and should cover maximum contents of the syllabus.
  • Remaining question will be mixed in nature (for example if Q.2 has part
    1. from module 3 then part
    2. will be from any other module. (Randomly selected from all the modules)
  • Total four questions need to be solved.

For detail Syllabus of all subjects of Information Technology (IT) 6th Sem 2018 regulation, visit IT 6th Sem Subjects of 2018 Pattern.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.